StegoStick
From Just Solve the File Format Problem
(Difference between revisions)
Parchivist (Talk | contribs) (Created page with "{{FormatInfo |formattype=electronic |subcat=Encryption |subcat2=Steganography |wikidata={{wikidata|Q7606697}} |released=2008 }} '''StegoStick''' by P.V. Uma Mahesh and V. San...") |
Parchivist (Talk | contribs) |
||
(2 intermediate revisions by one user not shown) | |||
Line 3: | Line 3: | ||
|subcat=Encryption | |subcat=Encryption | ||
|subcat2=Steganography | |subcat2=Steganography | ||
− | |||
|released=2008 | |released=2008 | ||
}} | }} | ||
− | '''StegoStick''' by P.V. Uma Mahesh and V. Santhosh Kumar is an open source steganography program that allows the hiding of a file in a [[BMP]] and the embedding of any file within another. | + | '''StegoStick''' by P.V. Uma Mahesh and V. Santhosh Kumar is an open source steganography program that allows the hiding of a file in a [[BMP]], [[WAV]], [[AVI]], or [[MPEG]] and the embedding of any file within another. |
− | It | + | It has 3 different encoders: |
+ | |||
+ | * BMP - uses standard LSB hiding. It will convert [[JPG]] or [[GIF]] to BMP | ||
+ | * Media (WAV, AVI, MPEG) - semi-generic LSB algorithm. Unfortunately it uses the LSB of every byte, so if a chunk is more than 8 bits (like a 16-bit WAV), changes aren't limited to the LSB, degrading the output | ||
+ | * Other - generic file appending | ||
It requires a password and offers DES, TripleDES, RSA and 'default' encryption | It requires a password and offers DES, TripleDES, RSA and 'default' encryption | ||
One weakness is that it is possible to determine what filetype was embedded | One weakness is that it is possible to determine what filetype was embedded | ||
− | |||
Line 20: | Line 22: | ||
== Links == | == Links == | ||
* [https://doi.org/10.7717/peerj-cs.7 Forensic analysis of video steganography tools] (mirror [https://www.proquest.com/docview/1956791137 1], [https://www.researchgate.net/publication/345803203_Forensic_analysis_of_video_steganography_tools 2]) - covers v1.0 beta | * [https://doi.org/10.7717/peerj-cs.7 Forensic analysis of video steganography tools] (mirror [https://www.proquest.com/docview/1956791137 1], [https://www.researchgate.net/publication/345803203_Forensic_analysis_of_video_steganography_tools 2]) - covers v1.0 beta | ||
− | * [https:// | + | * [https://sourceforge.net/projects/stegostick/ SourceForge] |
+ | * [https://securiumsolutions.com/quick-tour-with-steganography-tools/ Tutorial] | ||
+ | * [https://www.softpedia.com/get/Security/Encrypting/StegoStick.shtml Review] | ||
+ | * [http://ijet.pl/index.php/ijet/article/view/10.24425-ijet.2023.144340 Steganography in audio files – COTS software analysis] - analysis of its incorrect encoding technique for Media files |
Latest revision as of 22:00, 11 November 2023
StegoStick by P.V. Uma Mahesh and V. Santhosh Kumar is an open source steganography program that allows the hiding of a file in a BMP, WAV, AVI, or MPEG and the embedding of any file within another.
It has 3 different encoders:
- BMP - uses standard LSB hiding. It will convert JPG or GIF to BMP
- Media (WAV, AVI, MPEG) - semi-generic LSB algorithm. Unfortunately it uses the LSB of every byte, so if a chunk is more than 8 bits (like a 16-bit WAV), changes aren't limited to the LSB, degrading the output
- Other - generic file appending
It requires a password and offers DES, TripleDES, RSA and 'default' encryption
One weakness is that it is possible to determine what filetype was embedded
[edit] Links
- Forensic analysis of video steganography tools (mirror 1, 2) - covers v1.0 beta
- SourceForge
- Tutorial
- Review
- Steganography in audio files – COTS software analysis - analysis of its incorrect encoding technique for Media files